Video describes ShofarLeaks protection of sources

ShofarLeaks releases a video that describes the technology used to protect the source of a leak and how leaks are distributed to multiple autonomous servers. This is of vital concern for those who might otherwise be subject to harm, prison or death.
By: ShfoarLeaks
 
Nov. 14, 2012 - PRLog -- ShofarLeaks (http://shofarleaks.com/)™ has released a video that describes the technology used to protect the source of a leak and how leaks are distributed to multiple autonomous servers.  This is of vital concern for those who might otherwise be subject to retaliation from physical harm, prison or death.

While often leak sites are simply a source of otherwise hard to find data, sometimes the leak can cause quite a stir.  Protecting a source using the technology behind ShofarLeaks, ShofarDomain, ShofarPortfolio and ShofarNexus gives the greatest degree of anonymity available.

It is not hard to find news stories where a leak source has been tracked down due to the digital trail they left behind.  There are a remarkable number of technologies used behind the scenes to protect the source of a leak.

Once a leak is published, it takes on a life of its own and no central authority exists to take it down.  While mechanics can be used to refute the leak, the original data remains.  Analysis tools then allow others to put the information together for form usable summaries.

The video can be downloaded from the ShofarLeaks website or viewed on YouTube at http://youtu.be/8mZgyy9zfBk.

End
Source:ShfoarLeaks
Email:***@shofarleaks.com Email Verified
Tags:Whistleblower, Leaks, Privacy
Industry:Internet, Media
Location:United States
Subject:Features
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
ShofarLeaks News
Trending
Most Viewed
Daily News



Like PRLog?
9K2K1K
Click to Share